Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/rhythmictech/terraform-aws-secretsmanager-secret
Simple secret module for AWS Secrets Manager
https://github.com/rhythmictech/terraform-aws-secretsmanager-secret
aws aws-secret aws-secrets-manager aws-secretsmanager terraform terraform-module terraform-modules
Last synced: 4 days ago
JSON representation
Simple secret module for AWS Secrets Manager
- Host: GitHub
- URL: https://github.com/rhythmictech/terraform-aws-secretsmanager-secret
- Owner: rhythmictech
- License: mit
- Created: 2019-07-08T20:41:13.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2022-08-16T13:31:30.000Z (about 2 years ago)
- Last Synced: 2023-08-08T18:33:10.502Z (over 1 year ago)
- Topics: aws, aws-secret, aws-secrets-manager, aws-secretsmanager, terraform, terraform-module, terraform-modules
- Language: HCL
- Homepage: https://registry.terraform.io/modules/rhythmictech/secretsmanager-secret/aws
- Size: 27.3 KB
- Stars: 10
- Watchers: 3
- Forks: 19
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# terraform aws secretsmanager secret
[![](https://github.com/rhythmictech/terraform-aws-secretsmanager-secret/workflows/format-and-lint/badge.svg)](https://github.com/rhythmictech/terraform-aws-secretsmanager-secret/actions)Simple secret module for AWS secretsmanager
## Examples
### With a String
```hcl
module "secret" {
source = "rhythmictech/secretsmanager-secret/aws"
version = "0.2.0"name = "my-secret-string"
value = var.my_secret_stringtags = {
encoding = "none"
type = "string"
}
}
```### With a file
```hcl
module "secret" {
source = "rhythmictech/secretsmanager-secret/aws"
version = "0.2.0"name = "my-secret-file-base64-encoded"
value = base64encode(var.my_secret_file)tags = {
encoding = "base64"
type = "file"
}
}
```## Requirements
| Name | Version |
|------|---------|
| terraform | >= 0.12 |## Providers
| Name | Version |
|------|---------|
| aws | n/a |## Inputs
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| description | n/a | `string` | `"terraform-managed secret"` | no |
| kms\_key\_id | Optional. The KMS Key ID to encrypt the secret. KMS key arn or alias can be used. | `any` | `null` | no |
| name | Name of secret to store | `string` | n/a | yes |
| policy | Optional. The resource policy which controls access to the secret. | `any` | `null` | no |
| tags | User-Defined tags | `map(string)` | `{}` | no |
| value | Secret value to store | `string` | n/a | yes |## Outputs
| Name | Description |
|------|-------------|
| arn | AWS SecretManager Secret ARN |
| id | AWS SecretManager Secret ARN |
| secret | AWS SecretManager Secret resource |
| secret\_version | AWS SecretManager Secret Version resource |## The Giants underneath this module
- pre-commit.com/
- terraform.io/
- github.com/tfutils/tfenv
- github.com/segmentio/terraform-docs